I agree with Aaron.
the expire period in the stick table should cover at least the
expected work period.
This is also how I setup them.

Baptiste

On Fri, Jun 13, 2014 at 10:40 PM, Aaron West <aa...@loadbalancer.org> wrote:
> Hi,
>
> I'm not aware of a way to achieve what you want exactly.
>
> The stick table expiry works best with something like HTTP where connections
> are not that long so fresh connections keep refreshing the timer.
>
> In the case of SSH or RDP you have 1 potentially very long connection so the
> only option you have is to use a very long expire timeout. An example being
> RDP where I regularly recommend 12 hours or so for expire time...
>
> Aaron
>
>
> On 13 June 2014 02:52, Hailing Xu <hailin...@gmail.com> wrote:
>>
>> Hello haproxy geeks,
>>
>> I am trying to use haproxy in the following scenario that persistent tcp
>> connections using source ip.
>>
>> The client establishes a tcp connection (such as ssh for e.g),to vip, and
>> vip allocates a real server rs1.  I can see the stick table entry via cli.
>> When this tcp session keeps a long time, during this period, the relevant
>> stick table entry's expiration time is always decresing, until it is removed
>> for timeout. But at this time point the existing tcp connection is still
>> alive.  If I close the connection, and start a new one, it is allocated a
>> different real server, for round robin and no stick table entry matches.
>>
>> My question is "is it normal that timeout the stick entry even there is
>> still a session alive from that client?"
>> if yes, why it is designed such a way. Is it more comprehensible that the
>> stick table starts timing out after no session from that client.
>> if no, is there any configuration in haproxy I missed to avoid the stick
>> table timeout in case there still existing live session from that client.
>>
>> Thanks a lot for your help and information.
>> Hailing.
>
>

Reply via email to